Safety vulnerability ID: 74631
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
Latest version: 3.0.1
A command shell for managing the Linux LIO kernel target
This is a security update, it fixes CVE-2020-13867 and CVE-2020-10699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10699
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application